Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 05:05
Static task
static1
Behavioral task
behavioral1
Sample
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe
Resource
win7-20240903-en
General
-
Target
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe
-
Size
96KB
-
MD5
84bc7b538466daa41130d64f94c24b6c
-
SHA1
13213bd1cb2f5cf7121d3153daee1c65f7d747f8
-
SHA256
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73
-
SHA512
ea7c84e7dda528c6176ad00b18f66ee93526709f37873ab3cfa6ef6fac50c6ab738318e3c3fd4cf4647f83121dc6fc836e520f74eb8c4f55af767c73236d855b
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:JGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2860 omsecor.exe 2996 omsecor.exe 2452 omsecor.exe 1696 omsecor.exe 2588 omsecor.exe 2296 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 2860 omsecor.exe 2996 omsecor.exe 2996 omsecor.exe 1696 omsecor.exe 1696 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2980 set thread context of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2860 set thread context of 2996 2860 omsecor.exe 32 PID 2452 set thread context of 1696 2452 omsecor.exe 36 PID 2588 set thread context of 2296 2588 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2980 wrote to memory of 2432 2980 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 30 PID 2432 wrote to memory of 2860 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 31 PID 2432 wrote to memory of 2860 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 31 PID 2432 wrote to memory of 2860 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 31 PID 2432 wrote to memory of 2860 2432 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 31 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2860 wrote to memory of 2996 2860 omsecor.exe 32 PID 2996 wrote to memory of 2452 2996 omsecor.exe 35 PID 2996 wrote to memory of 2452 2996 omsecor.exe 35 PID 2996 wrote to memory of 2452 2996 omsecor.exe 35 PID 2996 wrote to memory of 2452 2996 omsecor.exe 35 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 2452 wrote to memory of 1696 2452 omsecor.exe 36 PID 1696 wrote to memory of 2588 1696 omsecor.exe 37 PID 1696 wrote to memory of 2588 1696 omsecor.exe 37 PID 1696 wrote to memory of 2588 1696 omsecor.exe 37 PID 1696 wrote to memory of 2588 1696 omsecor.exe 37 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38 PID 2588 wrote to memory of 2296 2588 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe"C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exeC:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56b88477da2ee1c25d9d462f479bc88cd
SHA148a314b5fae77d1ad598f1ac9d30adcb7c7b87e8
SHA25670321bc3e4a455418cde306da4194b779c4c01a474bf1aec1eaaac2de64d1f77
SHA5128fcceec0bc07d1552e864d57373e466c1cee2288b9422acd0cb7efeca45bf0cb99e802f990c0eff73a37c2b62da0378d45252dad14a2e74d44f4c08383039613
-
Filesize
96KB
MD5a1516364498bd58d25303246ab36f931
SHA17b2e8f12ade4a2341618f85140b4dd7fe4519041
SHA256b67ceb60d0f09b4d16b4640da40083f69c96ad976b7bb3df6bd31c3ede2825c9
SHA5126e6035ea12db2031b4b09ca6cd77843df50a2f5bdc07eb93d3ee621d1dd59bf114ecfa0b32f8664294df874a07a8a97fd73cbc77e8dae23ef5cbd8633d29117c
-
Filesize
96KB
MD5cc77c125aae978906ed0f55a757a93a9
SHA10483297ca0dc338feb04813ac17073f264b9f738
SHA2561f8c50952d16c8c7ab56fd59f396dcc7f9ec5f4ce8f70543dfa0a828e254a065
SHA5122987b91c9958f4219db122c41ea0489c21a18889b70b6dac7bccdab7f1b4f8e633a4eb7a41793a11868a006454c1431b9f0a93d5be609578862d0518da17f735